SlideShare a Scribd company logo
1 of 4
Download to read offline
www.UnifiedIP.com




                                           VoIP Glossary
Millions of people around the world have already switched to VoIP. While shopping around for VoIP phone,
you will come across lots of terminologies that can be overwhelming and confusing. Following Glossary
covers almost all terms and definitions that are commonly used in VoIP technology. Check out latest VoIP
terminologies and their meanings below.


Analog Telephone Adapter (ATA): A device that connects between an analog telephone and Internet
connection port that allows traditional non-IP phones to work with Voice over IP (VoIP) phone service.


Area Code: Three digit numbers that generally identifies a geographic area of a switch that provides service
to telephone device.


Asymmetric Digital Subscriber Line (ADSL): Technology for bringing high-bandwidth information to homes
and small businesses over ordinary copper telephone lines.


Asynchronous Transfer Mode (ATM): A dedicated-connection switching technology that organizes digital
data into 53-byte cell units and transmits them over a physical medium using digital signal technology. ATM
is designed to take advantage of high-speed transmission media such as E3, SONET, and T3.


Bandwidth: Amount of data that can be passed along a communications channel in a given period of time.
Bandwidth is generally measured in bits per second (bps).


Broadband: It's a term used to define high speed Internet connection, generally provided by cable TV, DSL,
or dedicated telecom lines.


Codec (Compressor/Decompressor): An algorithm used to compress and decompress audio and video files.


Compression: This term is used anywhere from 1:1 to 12:1 ratios in VoIP applications to consume less
bandwidth and leave more for data or other voice/fax communications.


Digital Subscriber Line (DSL): High-speed Internet service via existing copper phone lines or other
channels.


Dual Tone Multi-frequency (DTMF): The type of audio signals generated when you press buttons on a
touch-tone telephone.
www.UnifiedIP.com




Dynamic Host Configuration Protocol (DHCP): A communications protocol that automatically allocate and
assign IP addresses to multiple devices attached to a network using TCP/IP.


E1: A wide area digital transmission scheme available in Europe that carries data at a rate of 2.048Mbps, as
opposed to a T1 used in North America.


E911 (Enhanced 911): Allows cell phone users to dial 911 and be connected to the closest geographic Public
Safety Answering Point (PSAP).


Ethernet: A popular protocol for broadband bandwidth connectivity over Local Area Networks (LAN).


Firewall: A system designed to block unwanted network traffic going in and out of home or office network.


Fax over Internet Protocol (FoIP): A term to transport facsimiles over Internet.


H.323: An International Telecommunication Union standard call protocol for voice and video conferencing
over LANs, WANs, and Internet


Internet Protocol (IP): A method or protocol that define how data is transmitted over data network.


IP Phone: Also called an Internet phone or broadband phone. IP phone converts voice into digital packets and
vice versa to make phone calls over Internet.


Internet Protocol Telephony (IP Telephony): General term for technologies that uses IP-based data networks
to exchange voice, fax, and other forms of information.


Internet Service Provider (ISP): A company that provides subscriber-based access to Internet.


Internet Telephony Service Provider (ITSP): A company that offers low-cost phone calls that run over
Internet.


Interactive voice response (IVR): A system that collects information from a user to process commands.


Latency: It is the time that elapses between initiation of a request for data and start of actual data transfer.
This delay may be in nanoseconds but it is still used to judge efficiency of networks.
www.UnifiedIP.com




Multiprotocol Label Switching (MPLS): A method for maximizing network speeds on high traffic networks.
It enables enterprises and service providers to build intelligent networks that deliver scalable, end-to-end
services.


Plain Old Telephone System (POTS): Traditional telephone service over analog lines.


Power over Ethernet (POE): A system to transmit electrical power over a standard twisted pair Ethernet
cable.


Private Branch Exchange (PBX): A private telephone switching system for voice switching and other
telephone related services. PBX routes calls from public telephone system within an organization and allows
direct internal calls.


Public Switched Telephone Network (PSTN): This is an international telephone system that is used in most
of the countries based on copper wires carrying analog voice data.


Router: A device that connects multiple networks together and forwards data packets between them.


Real Time Transport Protocol (RTP): An Internet protocol that functions for end-to-end network connections
for applications that use audio or video.


Session Initiation Protocol (SIP): A communication protocol that operates similarly to H.323 but it's more
Internet and Web-friendly. It's primarily used for Voice over IP calls and is predominant signaling method.


SIP Phone: A SIP phone is a telephone that uses SIP (Session Initiation Protocol) standard to make a voice
call over Internet.


Session Initiation Protocol Trunking (SIP Trunking): It's a Voice over Internet Protocol (VoIP) service
offered by many Internet telephony service providers (ITSPs) that connects a company's private branch
exchange (PBX) telephone system to public switched telephone network (PSTN) via Internet.


SoftPBX: A PBX that is implemented in software, and typically runs on PC. Many softPBXs can be clustered
across multiple machines for reliability and performance.


T1: A 1.544-Mbps point-to-point dedicated digital circuit provided by telephone companies consisting of 24
channels. This is available mainly in the US, as opposed to an E1 that's used in Europe
www.UnifiedIP.com




T3: An Internet line (also known as a DS-3) is an ultra high-speed connection capable of transmitting data at
rates of up to 44.736 Mbps.


T38: A recognized standard for sending fax transmissions over an IP network in real time mode.


Type of Service (TOS): A method of setting precedence for a particular type of traffic for QoS (Quality of
Service).


User Datagram Protocol (UDP): A communications protocol that offers a limited amount of service when
messages are exchanged between computers in a network that uses Internet Protocol (IP).


Virtual Phone Number: A feature of VoIP that allows attaching additional phone numbers with different area
codes to basic VoIP service.


Virtual Private Network (VPN): It enables IP traffic to travel securely over a public TCP/IP network by
encrypting all traffic from one network to another.


VoIP Phone: A phone that uses Internet to route voice calls by converting voice data into IP packets and vice
versa.


Voice over Internet Protocol (VoIP): A technology that is used to transmit voice over Internet. Also known as
Internet Protocol telephony and IP telephony.


VoIP Gateway: A device, which connects between telephone system and Ethernet network.


Voice over Internet Protocol Private Branch eXchange (VoIP PBX): A telephone switch that converts IP
phone calls into traditional circuit-switched TDM connections. It also supports traditional analog and digital
telephones.


Wi-Fi Phone: A phone that enables users to make phone calls from Wi-FI network environments.


Worldwide Interoperability for Microwave Access (WiMAX): An IP based, wireless broadband access
technology that provides wireless data over long distances in variety of ways, including point-to-point links
and full mobile cellular type access.


Source: http://www.unifiedip.com/voip-glossary/

More Related Content

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

VoIP Glossary

  • 1. www.UnifiedIP.com VoIP Glossary Millions of people around the world have already switched to VoIP. While shopping around for VoIP phone, you will come across lots of terminologies that can be overwhelming and confusing. Following Glossary covers almost all terms and definitions that are commonly used in VoIP technology. Check out latest VoIP terminologies and their meanings below. Analog Telephone Adapter (ATA): A device that connects between an analog telephone and Internet connection port that allows traditional non-IP phones to work with Voice over IP (VoIP) phone service. Area Code: Three digit numbers that generally identifies a geographic area of a switch that provides service to telephone device. Asymmetric Digital Subscriber Line (ADSL): Technology for bringing high-bandwidth information to homes and small businesses over ordinary copper telephone lines. Asynchronous Transfer Mode (ATM): A dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology. ATM is designed to take advantage of high-speed transmission media such as E3, SONET, and T3. Bandwidth: Amount of data that can be passed along a communications channel in a given period of time. Bandwidth is generally measured in bits per second (bps). Broadband: It's a term used to define high speed Internet connection, generally provided by cable TV, DSL, or dedicated telecom lines. Codec (Compressor/Decompressor): An algorithm used to compress and decompress audio and video files. Compression: This term is used anywhere from 1:1 to 12:1 ratios in VoIP applications to consume less bandwidth and leave more for data or other voice/fax communications. Digital Subscriber Line (DSL): High-speed Internet service via existing copper phone lines or other channels. Dual Tone Multi-frequency (DTMF): The type of audio signals generated when you press buttons on a touch-tone telephone.
  • 2. www.UnifiedIP.com Dynamic Host Configuration Protocol (DHCP): A communications protocol that automatically allocate and assign IP addresses to multiple devices attached to a network using TCP/IP. E1: A wide area digital transmission scheme available in Europe that carries data at a rate of 2.048Mbps, as opposed to a T1 used in North America. E911 (Enhanced 911): Allows cell phone users to dial 911 and be connected to the closest geographic Public Safety Answering Point (PSAP). Ethernet: A popular protocol for broadband bandwidth connectivity over Local Area Networks (LAN). Firewall: A system designed to block unwanted network traffic going in and out of home or office network. Fax over Internet Protocol (FoIP): A term to transport facsimiles over Internet. H.323: An International Telecommunication Union standard call protocol for voice and video conferencing over LANs, WANs, and Internet Internet Protocol (IP): A method or protocol that define how data is transmitted over data network. IP Phone: Also called an Internet phone or broadband phone. IP phone converts voice into digital packets and vice versa to make phone calls over Internet. Internet Protocol Telephony (IP Telephony): General term for technologies that uses IP-based data networks to exchange voice, fax, and other forms of information. Internet Service Provider (ISP): A company that provides subscriber-based access to Internet. Internet Telephony Service Provider (ITSP): A company that offers low-cost phone calls that run over Internet. Interactive voice response (IVR): A system that collects information from a user to process commands. Latency: It is the time that elapses between initiation of a request for data and start of actual data transfer. This delay may be in nanoseconds but it is still used to judge efficiency of networks.
  • 3. www.UnifiedIP.com Multiprotocol Label Switching (MPLS): A method for maximizing network speeds on high traffic networks. It enables enterprises and service providers to build intelligent networks that deliver scalable, end-to-end services. Plain Old Telephone System (POTS): Traditional telephone service over analog lines. Power over Ethernet (POE): A system to transmit electrical power over a standard twisted pair Ethernet cable. Private Branch Exchange (PBX): A private telephone switching system for voice switching and other telephone related services. PBX routes calls from public telephone system within an organization and allows direct internal calls. Public Switched Telephone Network (PSTN): This is an international telephone system that is used in most of the countries based on copper wires carrying analog voice data. Router: A device that connects multiple networks together and forwards data packets between them. Real Time Transport Protocol (RTP): An Internet protocol that functions for end-to-end network connections for applications that use audio or video. Session Initiation Protocol (SIP): A communication protocol that operates similarly to H.323 but it's more Internet and Web-friendly. It's primarily used for Voice over IP calls and is predominant signaling method. SIP Phone: A SIP phone is a telephone that uses SIP (Session Initiation Protocol) standard to make a voice call over Internet. Session Initiation Protocol Trunking (SIP Trunking): It's a Voice over Internet Protocol (VoIP) service offered by many Internet telephony service providers (ITSPs) that connects a company's private branch exchange (PBX) telephone system to public switched telephone network (PSTN) via Internet. SoftPBX: A PBX that is implemented in software, and typically runs on PC. Many softPBXs can be clustered across multiple machines for reliability and performance. T1: A 1.544-Mbps point-to-point dedicated digital circuit provided by telephone companies consisting of 24 channels. This is available mainly in the US, as opposed to an E1 that's used in Europe
  • 4. www.UnifiedIP.com T3: An Internet line (also known as a DS-3) is an ultra high-speed connection capable of transmitting data at rates of up to 44.736 Mbps. T38: A recognized standard for sending fax transmissions over an IP network in real time mode. Type of Service (TOS): A method of setting precedence for a particular type of traffic for QoS (Quality of Service). User Datagram Protocol (UDP): A communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses Internet Protocol (IP). Virtual Phone Number: A feature of VoIP that allows attaching additional phone numbers with different area codes to basic VoIP service. Virtual Private Network (VPN): It enables IP traffic to travel securely over a public TCP/IP network by encrypting all traffic from one network to another. VoIP Phone: A phone that uses Internet to route voice calls by converting voice data into IP packets and vice versa. Voice over Internet Protocol (VoIP): A technology that is used to transmit voice over Internet. Also known as Internet Protocol telephony and IP telephony. VoIP Gateway: A device, which connects between telephone system and Ethernet network. Voice over Internet Protocol Private Branch eXchange (VoIP PBX): A telephone switch that converts IP phone calls into traditional circuit-switched TDM connections. It also supports traditional analog and digital telephones. Wi-Fi Phone: A phone that enables users to make phone calls from Wi-FI network environments. Worldwide Interoperability for Microwave Access (WiMAX): An IP based, wireless broadband access technology that provides wireless data over long distances in variety of ways, including point-to-point links and full mobile cellular type access. Source: http://www.unifiedip.com/voip-glossary/